Sciweavers

13180 search results - page 2463 / 2636
» Network Models
Sort
View
122
Voted
DASFAA
2010
IEEE
148views Database» more  DASFAA 2010»
15 years 8 months ago
Competitive Privacy: Secure Analysis on Integrated Sequence Data
Sequence data analysis has been extensively studied in the literature. However, most previous work focuses on analyzing sequence data from a single source or party. In many applica...
Raymond Chi-Wing Wong, Eric Lo
136
Voted
ARVLSI
1999
IEEE
162views VLSI» more  ARVLSI 1999»
15 years 8 months ago
Conjunction Search Using a 1-D, Analog VLSI-based, Attentional Search/Tracking Chip
The ability of animals to select a limited region of sensory space for scrutiny is an important factor in dealing with cluttered or complex sensory environments. Such an attention...
Timothy K. Horiuchi, Ernst Niebur
129
Voted
CSFW
1999
IEEE
15 years 8 months ago
Secure Composition of Insecure Components
Software systems are becoming heterogeneous: instead of a small number of large programs from well-established sources, a user's desktop may now consist of many smaller compo...
Peter Sewell, Jan Vitek
HCW
1999
IEEE
15 years 7 months ago
A Unified Resource Scheduling Framework for Heterogeneous Computing Environments
A major challenge in Metacomputing Systems (Computational Grids) is to effectively use their shared resources, such as compute cycles, memory, communication network, and data repo...
Ammar H. Alhusaini, Viktor K. Prasanna, Cauligi S....
152
Voted
WIDM
1999
ACM
15 years 7 months ago
An Efficient Plan Execution System for Information Management Agents
Recent work on information integration has yielded novel and efficient solutions for gathering data from the World Wide Web. However, there has been little attention given to the ...
Greg Barish, Dan DiPasquo, Craig A. Knoblock, Stev...
« Prev « First page 2463 / 2636 Last » Next »